this post was submitted on 11 Jul 2023
19 points (100.0% liked)

Lemmy

497 readers
1 users here now

Everything about Lemmy; bugs, gripes, praises, and advocacy.

For discussion about the lemmy.ml instance, go to !meta@lemmy.ml.

founded 4 years ago
MODERATORS
 

I think for a while leading up to the recent session stealing hack, there has been a massive amount of positivity from Lemmy users around all kinds of new Lemmy apps, frontends, and tools that have been popping up lately.

Positivity is great, but please be aware that basically all of these things work by asking for complete access to your account. When you enter your Lemmy password into any third party tool, they are not just getting access to your session (which is what was stolen from some users during the recent hack), they also get the ability to generate more sessions in the future without your knowledge. This means that even if an admin resets all sessions and kicks all users out, anybody with your password can of course still take over your account!

This isn't to say that any current Lemmy app developers are for sure out to get you, but at this point, it's quite clear that there are malicious folks out there. Creating a Lemmy app seems like a completely easy vector to attack users right now, considering how trusting everybody has been. So please be careful about what code you run on your devices, and who you trust with your credentials!

top 31 comments
sorted by: hot top controversial new old
[–] sunaurus@lemm.ee 6 points 1 year ago (1 children)
[–] nekat_emanresu@lemmy.ml 0 points 1 year ago (1 children)

Do another one, replace the last panels "alpha Lemmy app" to "password manager" lol

[–] usernotfound@lemmy.ml 3 points 1 year ago

How many password managers have you been trying out this week?

[–] Vlyn@lemmy.ml 4 points 1 year ago (1 children)

Sorry, but that's literally every online service. For example if you buy a new virtual server it takes like 5 minutes till a Chinese IP starts to try root passwords.

If someone actually wanted to harm Lemmy they'd just DDOS the biggest instances for a month (which would be easy, it's mostly single servers after all) or attack it with so much spam and large images that storage would break.

[–] OtakuAltair@lemm.ee 1 points 1 year ago* (last edited 1 year ago) (1 children)

We need moderation tools

Here's hoping Sync and Boost lead the way

[–] grue@lemmy.ml 1 points 1 year ago (1 children)

Here's hoping Sync and Boost lead the way

Or better yet, let's hope Free Software apps lead the way and ditch the proprietary ones.

[–] OtakuAltair@lemm.ee 0 points 1 year ago

Well, Sync and Boost were well established already. It's probably gonna take some time for the new foss ones to catch up

[–] corytheboyd@kbin.social 2 points 1 year ago

Feels like this will be a very common occurrence with people rushing to build and use new apps, and host new servers. There are plenty of positives to fediverse vs centralized, but it doesn’t come without negatives.

[–] poVoq@slrpnk.net 1 points 1 year ago

Oauth2 login support for apps would certainly be very welcome.

[–] ablackcatstail@lemmy.goblackcat.com 1 points 1 year ago (1 children)

I am using the Liftoff app. It looks pretty safe but I don't really know.

[–] Fisch@lemmy.ml 2 points 1 year ago

It's open source and pretty popular (for a Lemmy app at least) so it should be pretty safe

[–] TheSaneWriter@lemm.ee 1 points 1 year ago

Indeed, this is a real weak spot with Lemmy's security. I honestly think we need to place more emphasis on implementing OAuth2, when I have the time I'll have to take a look at that again to see if I'm able to.

[–] starman@programming.dev 1 points 1 year ago* (last edited 1 year ago) (2 children)

Using open source apps, especially with more than one contributor, is currently the best option to be safe from this kind of attack.

[–] sunaurus@lemm.ee 1 points 1 year ago (2 children)

It helps, but it's still not a silver bullet. For example, a Lemmy app could contain no malicious code in its open source repository, but malicious code could still be added to a binary release in an app store.

[–] XpeeN@sopuli.xyz 0 points 1 year ago (1 children)

Yeah, downloading from fdroid or izzyondroid kinda solves that.

Izzy directly sends over the APKs from GitHub releases. F-Droid does their own builds which is partly why they're so slow to update.

[–] grue@lemmy.ml 0 points 1 year ago

That's why F-Droid is the safest Android app repository. If I'm not mistaken, every app they offer is rebuilt from the public source code by the repo package maintainer.

[–] iegod@lemm.ee 0 points 1 year ago (1 children)

OSS does not guarantee security, ever. Please let's not fall into false sense of security.I

[–] starman@programming.dev 0 points 1 year ago (1 children)

But in this case, if an app is open source, there is a higher chance of discovering that it sends your credentials somewhere else than in closed source app

[–] iegod@lemm.ee 1 points 1 year ago

That assumes people are looking at that and know what they're doing and aren't malicious actors. None of this is guaranteed. Famous examples of major OSS security vulnerabilities have already shown this.

[–] cooljacob204@kbin.social 0 points 1 year ago (2 children)

1password is probably the most valuable subscription I pay for.

[–] pizzahoe@lemm.ee 1 points 1 year ago (1 children)

If anyone's looking for a free and open source option, Bitwarden is also great.

[–] nekat_emanresu@lemmy.ml 0 points 1 year ago* (last edited 1 year ago) (1 children)

You two have no idea do you? lol

When you pass your password into an app, it can just copy and store it. If at any point you put a password through, even once, its compromised and no password manager will help in the slightest.

I make bobApp, you download bobApp, if you put a password into it, you are done.

edit: answering both of you.

Then i misunderstood. After i typed this I noticed others said what you meant. My bad.

[–] TheSaneWriter@lemm.ee 0 points 1 year ago

You're correct, but by maintaining distinct passwords with a password manager you make sure only the one account is compromised. 2FA also helps, you may have the username and password, but the 2FA code that you were given needs to be used immediately or else it will expire, and an expired 2FA code won't allow you to successfully breach the account you're trying to break into to.

[–] lowleveldata@programming.dev 0 points 1 year ago (1 children)

KeePassXC is free and completely offline

[–] grue@lemmy.ml 0 points 1 year ago

And if you want it to be online, you can just share your .kdbx file between your computers using Syncthing or whatever.

[–] ChaosCharlie@lemmy.ca 0 points 1 year ago (3 children)

Are there any known apps that should be avoided? I’m using Mlem and Memmy.

[–] NotAPenguin@kbin.social 2 points 1 year ago (1 children)

It's not about any specific app.

They are just using many words to say 'remember logging in on these apps means giving them your full username/password.'

[–] xXGanondorfXx@kbin.social 1 points 1 year ago

We really need a better way to log in from 3rd parties. It'd be nice if we could crowd fund features, I'd def pay up for some sort of app-password system or other

[–] Fisch@lemmy.ml 1 points 1 year ago

Not yet, this post is just a warning that it might happen

[–] Efwis@lemmy.zip 1 points 1 year ago

Not sure about the other apps, but Memmy keeps your password stored in the app. But generally speaking I don’t think Gavin is a malicious person. He spent 3 weeks with beta tests before he was even comfortable pushing it to Apple App Store and the code is reviewed by Apple before being included to watch for malicious scripting. I am not saying people don’t get malicious scripts passed through Apple, but from what I have seen of Gavin’s work, he doesn’t seem the type that would do that.

load more comments
view more: next ›